Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV045148660
    Format: 1 Online-Ressource (XXXII, 411 p. 1 illus)
    ISBN: 9781402079276
    Series Statement: The International Series in Engineering and Computer Science 767
    Content: The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure protection terms (quick refresher terms). Special attention is given to terms that most often prevent educated readers from understanding journal articles or books in cryptography, computer security, information systems, role-based access management and applied fields that build on those disciplines. Also included in the dictionary are terms that refer to computing forensics, malware attacks, privacy issues, system design, security auditing and vulnerability testing. Although it is difficult for an IT professional or an IT student to keep aware of the current terminology being practiced today, the Dictionary of Information Security presents cutting-edge information on the most recent terms in use in one concisely formatted volume. Similar to dictionaries for languages, statistics, epidemiology and other disciplines, this IT Security Dictionary is a reference tool that should become part of any professional and IT student's library. The Dictionary of Information Security is designed for a professional audience, composed of researchers and practitioners in industry. This dictionary is also suitable for students in computer science, engineering and information sciences
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781402078897
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Wörterbuch ; Wörterbuch
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_894683284
    Format: 1 Online-Ressource (VII, 220 Seiten) , Diagramme
    ISBN: 9789004334298
    Series Statement: Language and computers 43
    Content: Preliminary material /Lars Borin -- … and never the twain shall meet? /Lars Borin -- Towards a multilingual corpus for contrastive analysis and translation studies /Stig Johansson -- The PLUG project: parallel corpora in Linköping, Uppsala, Göteborg: aims and achievements /Anna Sågvall Hein -- The Uppsala Student English Corpus (USE): a multi-faceted resource for research and course development /Margareta Westergren Axelsson and Ylva Berglund -- How can linguists profit from parallel corpora? /Raphael Salkie -- Parallel corpora as tools for investigating and developing minority languages /Trond Trosterud -- Reversing a Swedish-English dictionary for the Internet /Christer Geisler -- Multilingual corpus-based extraction and the Very Large Lexicon /Gregory Grefenstette -- The PLUG Link Annotator – interactive construction of data from parallel corpora /Magnus Merkel , Mikael Andersson and Lars Ahrenberg -- Building and processing a multilingual corpus of parallel texts /Peter Stahl -- Uplug – a modular corpus tool for parallel corpora /Jörg Tiedemann -- Part-of-speech tagging for Swedish /Klas Prütz -- Alignment and tagging /Lars Borin -- List of contributors /Lars Borin.
    Additional Edition: ISBN 9789042015302
    Additional Edition: ISBN 9042015306
    Additional Edition: Erscheint auch als Druck-Ausgabe Parallel corpora, parallel worlds
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    Keywords: Korpus ; Kontrastive Linguistik ; Computerlinguistik
    URL: DOI
    Author information: Borin, Lars 1957-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    UID:
    gbv_775328626
    Format: Online-Ressource (XV, 293p) , online resource
    Edition: Fifth Edition
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783642554810
    Content: Originally published in 1981, this was the first textbook on programming in the Prolog language and is still the definitive introductory text on Prolog. Though many Prolog textbooks have been published since, this one has withstood the test of time because of its comprehensiveness, tutorial approach, and emphasis on general programming applications. Prolog has continued to attract a great deal of interest in the computer science community, and has turned out to be the basis for an important new generation of programming languages and systems for Artificial Intelligence. Since the previous edition of Programming in Prolog, the language has been standardised by the International Organization for Standardization (ISO) and this book has been updated accordingly. The authors have also introduced some new material, clarified some explanations, corrected a number of minor errors, and removed appendices about Prolog systems that are now obsolete
    Note: 1 Tutorial IntroductionGives the student a feel for what it is like to program in Prolog. Introduces objects, relationships, facts, rules, variables -- 1.1 Prolog -- 1.2 Objects and Relationships -- 1.3 Programming -- 1.4 Facts -- 1.5 Questions -- 1.6 Variables -- 1.7 Conjunctions -- 1.8 Rules -- 1.9 Summary and Exercises -- 2 A Closer Look -- More detailed presentation of Prolog syntax and data structures -- 2.1 Syntax -- 2.2 Characters -- 2.3 Operators -- 2.4 Equality and Unification -- 2.5 Arithmetic -- 2.6 Summary of Satisfying Goals -- 3 Using Data Structures -- Representing objects and relationships by using trees and lists. Developing several standard Prolog programming techniques -- 3.1 Structures and Trees -- 3.2 Lists -- 3.3 Recursive Search -- 3.4 Mapping -- 3.5 Recursive Comparison -- 3.6 Joining Structures Together -- 3.7 Accumulators -- 3.8 Difference Structures -- 4 Backtracking and the “Cut” -- How a set of clauses generates a set of solutions. Using “cut” to modify the control sequence of running Prolog programs -- 4.1 Generating Multiple Solutions -- 4.2 The “Cut” -- 4.3 Common Uses of the Cut -- 4.4 Problems with the Cut -- 5 Input and Output -- Facilities available for the input and output of characters and structures. Developing a program to read sentences from the user and represent the structure as a list of words, which can be used with the Grammar Rules of Chapter -- 5.1 Reading and Writing Terms -- 5.2 Reading and Writing Characters -- 5.3 Reading English Sentences -- 5.4 Reading and Writing Files -- 5.5 DeclaringOperators -- 6 Built-in Predicates -- Definition of the “core” built-in predicates, with sensible examples of how each one is used. By this point, the reader should be able to read reasonably complex programs, and should therefore be able to absorb the built-in predicates by seeing them in use -- 6.1 EnteringNew Clauses -- 6.2 Success and Failure -- 6.3 Classifying Terms -- 6.4 Treating Clauses as Terms -- 6.5 Constructing and Accessing Components of Structures -- 6.6 Affecting Backtracking -- 6.7 Constructing Compound Goals -- 6.8 Equality -- 6.9 Input and Output -- 6.10 Handling Files -- 6.11 Evaluating Arithmetic Expressions -- 6.12 Comparing Terms -- 6.13 Watching Prolog atWork -- 7 More Example Programs -- Many example programs are given, covering a wide range of interests. Examples include list processing, set operations, symbolic differentiation and simplification of formula -- 7.1 A Sorted Tree Dictionary -- 7.2 Searching a Maze -- 7.3 The Towers of Hanoi -- 7.4 Parts Inventory -- 7.5 List Processing -- 7.6 Representing andManipulating Sets -- 7.7 Sorting -- 7.8 Using the Database -- 7.9 SearchingGraphs -- 7.10 Sift the Two’s and Sift the Three’s -- 7.11 Symbolic Differentiation -- 7.12 Mapping Structures and Transforming Trees -- 7.13 Manipulating Programs -- 7.14 Bibliographic Notes -- 8 Debugging Prolog Programs -- By this point, the reader will be able to write reasonable programs, and so the problem of debugging will be relevant. Flow of control model, hints about common bugs, techniques of debugging. -- 8.1 Laying out Programs -- 8.2 Common Errors -- 8.3 The Tracing Model -- 8.4 Tracing and Spy Points -- 8.5 Fixing Bugs -- 9 Using Prolog Grammar Rules -- Applications of existing techniques. Using Grammar Rules. Examining the design decisions for some aspects of analysing natural language with Grammar Rules -- 9.1 The Parsing Problem -- 9.2 Representing the Parsing Problemin Prolog -- 9.3 The Grammar Rule Notation -- 9.4 Adding ExtraArguments -- 9.5 Adding Extra Tests -- 9.6 Summary -- 9.7 Translating Language into Logic -- 9.8 More General Use of Grammar Rules -- 10 The Relation of Prolog to Logic -- Predicate Calculus, clausal form, resolution theorem proving, logic programming -- 10.1 Brief Introduction to Predicate Calculus -- 10.2 Clausal Form -- 10.3 A Notation for Clauses -- 10.4 Resolution and Proving Theorems -- 10.5 Horn Clauses -- 10.6 Prolog -- 10.7 Prolog and Logic Programming -- 11 Projects in Prolog -- A selection of suggested exercises, projects and problems -- 11.1 Easier Projects -- 11.2 Advanced Projects -- A Answers to Selected Exercises -- B Clausal Form Program Listings -- C Writing Portable Standard Prolog Programs -- The Prolog standard, writing portable programs and dealing with different Prolog implementations -- C.1 Standard Prolog for Portability -- C.2 Different Prolog Implementations -- C.3 Issues to LookOut For -- C.4 Definitions of some Standard Predicates -- C.4.1 Character Processing -- C.4.2 Directives -- C.4.3 Stream Input/Output -- C.4.4 Miscellaneous -- D CodetoSupport DCGs -- D.1 DCG Support Code.
    Additional Edition: ISBN 9783540006787
    Additional Edition: Erscheint auch als Druck-Ausgabe Clocksin, William F., 1955 - Programming in Prolog Berlin : Springer, 2003 ISBN 3540006788
    Additional Edition: ISBN 9783540006787
    Additional Edition: ISBN 0387006788
    Language: English
    Subjects: Computer Science , Economics , Comparative Studies. Non-European Languages/Literatures
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: PROLOG ; PROLOG
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    London : Springer
    UID:
    gbv_749175737
    Format: Online-Ressource (XIII, 248 p) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9780857293763
    Series Statement: Springer Professional Computing
    Content: The emerging Second-Generation Web is based entirely on XML and related technologies. This new version of the Web introduces a multitude of novel concepts, terms, and acronyms. The goal of this dictionary is not just to define the meaning of new words but to develop a proper understanding of leading-edge Web technologies. It will be an invaluable reference for all Internet professionals and practitioners as well as students and ordinary Web users. Key topics: - XML syntax and core technologies - All the major members of the XML family of technologies - Numerous XML-based domain-specific languages - Concept and architecture of the Semantic Web - Key Semantic Web technologies - Web services Features and Benefits: - Over 1,800 terms and definitions from a newly emerged area - Over 200 illustrations to promote an understanding of the latest technologies - Clear and accessible definitions and a unique writing style bridge the gap between definition and explanation - Extensive cross-referencing of terms and a CD-ROM containing a fully searchable version of the dictionary
    Additional Edition: ISBN 9781447110477
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781852337681
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781447110477
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780857293770
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1649270380
    Format: Online-Ressource
    ISBN: 9783540456551 , 354043996X
    Series Statement: Lecture Notes in Computer Science 2387
    Content: Invited Lectures -- The Assembly of the Human and Mouse Genomes -- Data Structures for One-Dimensional Packet Classification Using Most-Specific-Rule Matching -- DNA Complementarity and Paradigms of Computing -- Complexity Theory I -- On Higher Arthur-Merlin Classes -- (2 + f(n))-SAT and Its Properties -- On the Minimal Polynomial of a Matrix -- Computable Real Functions of Bounded Variation and Semi-computable Real Numbers -- Discrete Algorithms I -- Improved Compact Routing Tables for Planar Networks via Orderly Spanning Trees -- Coloring Algorithms on Subcubic Graphs -- Efficient Algorithms for the Hamiltonian Problem on Distance-Hereditary Graphs -- Extending the Accommodating Function -- Computational Biology and Learning Theory I -- Inverse Parametric Sequence Alignment -- The Full Steiner Tree Problem in Phylogeny -- Inferring a Union of Halfspaces from Examples -- Dictionary Look-Up within Small Edit Distance -- Coding Theory and Cryptography -- Polynomial Interpolation of the Elliptic Curve and XTR Discrete Logarithm -- Co-orthogonal Codes -- Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m) -- A Combinatorial Approach to Anonymous Membership Broadcast -- Parallel and Distributed Architectures -- Solving Constraint Satisfaction Problems with DNA Computing -- New Architecture and Algorithms for Degradable VLSI/WSI Arrays -- Cluster: A Fast Tool to Identify Groups of Similar Programs -- Broadcasting in Generalized de Bruijn Digraphs -- Graph Theory -- On the Connected Domination Number of Random Regular Graphs -- On the Number of Minimum Cuts in a Graph -- On Crossing Numbers of 5-Regular Graphs -- Maximum Flows and Critical Vertices in AND/OR Graphs -- Radio Networks -- New Energy-Efficient Permutation Routing Protocol for Single-Hop Radio Networks -- Simple Mutual Exclusion Algorithms Based on Bounded Tickets on the Asynchronous Shared Memory Model -- Time and Energy Optimal List Ranking Algorithms on the k-Channel Broadcast Communication Model -- Energy-Efficient Size Approximation of Radio Networks with No Collision Detection -- Automata and Formal Languages -- A New Class of Symbolic Abstract Neural Nets: Tissue P Systems -- Transducers with Set Output -- Self-assembling Finite Automata -- Repetition Complexity of Words -- Internet Networks -- Using PageRank to Characterize Web Structure -- On Randomized Broadcasting and Gossiping in Radio Networks -- Fast and Dependable Communication in Hyper-rings -- Computational Geometry I -- The On-Line Heilbronn’s Triangle Problem in Three and Four Dimensions -- Algorithms for Normal Curves and Surfaces -- Terrain Polygon Decomposition, with Application to Layered Manufacturing -- Computational Biology and Learning Theory II -- Supertrees by Flipping -- A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays -- Sharpening Occam’s Razor -- Approximating 3D Points with Cylindrical Segments -- Discrete Algorithms II -- Algorithms for the Multicolorings of Partial k-Trees -- A Fault-Tolerant Merge Sorting Algorithm -- 2-Compromise Usability in 1-Dimensional Statistical Databases -- Computational Geometry II -- An Experimental Study and Comparison of Topological Peeling and Topological Walk -- On-Line Maximizing the Number of Items Packed in Variable-Sized Bins -- On-Line Grid-Packing with a Single Active Grid -- Bend Minimization in Orthogonal Drawings Using Integer Programming -- Combinatorial Optimization -- The Conditional Location of a Median Path -- New Results on the k-Truck Problem -- Theory of Equal-Flows in Networks -- Minimum Back-Walk-Free Latency Problem -- Complexity II -- Counting Satisfying Assignments in 2-SAT and 3-SAT -- On the Maximum Number of Irreducible Coverings of an n-Vertex Graph by n — 3 Cliques -- On Reachability in Graphs with Bounded Independence Number -- On Parameterized Enumeration -- Quantum Computing -- Probabilistic Reversible Automata and Quantum Automata -- Quantum versus Deterministic Counter Automata -- Quantum DNF Learnability Revisited.
    Note: Lizenzpflichtig
    Additional Edition: ISBN 9783540439967
    Additional Edition: Buchausg. u.d.T. Computing and combinatorics Berlin : Springer, 2002 ISBN 354043996X
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Theoretische Informatik ; Kombinatorik ; Berechenbarkeit ; Theoretische Informatik ; Kombinatorik ; Berechenbarkeit ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1649368801
    Format: Online-Ressource
    ISBN: 9783540451518 , 3540676279
    Series Statement: Lecture Notes in Computer Science 1846
    Content: Invited Talks -- Visual Data Mining for Business Intelligence Applications -- Parallel Data Mining on Large Scale PC Cluster -- XML: DTD and Queries -- XML Query Languages in Practice: An Evaluation -- A Two-Level Method for Clustering DTDs1 -- XML Queries via SQL -- Inferring DTD to Facilitate User-Oriented XML Documents Query -- O-O: Modeling and Implementation -- An Object Oriented Multidimensional Data Model for OLAP -- Applying Object-Oriented Conceptual Modeling Techniques to the Design of Multidimensional Databases and OLAP Applications -- An Optimal Locking Scheme in Object-Oriented Database Systems -- Association Rules: Mining and Application -- An Efficient Distributed Algorithm for Computing Association Rules -- Mining Association Rules with Negative Items Using Interest Measure -- Probabilistic Approach to Association Rules in Incomplete Databases -- Discovering Sequential Patterns from Non-uniform Databases -- An Effective Approach to Mining Exception Class Association Rules1 -- Enterprise Information Systems and E-Commerce -- Integrated Data Management and Enterprise Models -- A Virtual Private Network for Virtual Enterprise Information Systems -- Adaptive Online Retail Web Site Based on Hidden Markov Model -- A Protocol for Untraceable Electronic Cash -- The Web: Document Management and Retrieval -- Materializing Web Data for OLAP and DSS -- Hierarchically Classifying Chinese Web Documents without Dictionary Support and Segmentation Procedure1 -- Web Clustering and Association Rule Discovery for Web Broadcast -- A Non-Euclidean Model for Web Retrieval -- Advanced Replacement Policies for WWW Caching -- Spatial and Temporal Databases -- Extending Rectangle Join Algorithms for Rectilinear Polygons -- HMT: Modeling Temporal Aspects in Hypermedia Applications -- Hana Tree: A Dynamic and Robust Access Method for Spatial Data Handling -- MADGIS: A New Architecture for Distributed GIS under Internet Environment -- Data Warehousing -- Global View Maintenance by Using Inference Relationship among Views -- Maintaining Materialized Views for Data Warehouses with Multiple Remote Sources -- Using Loglinear Models to Compress Datacubes -- Materialized View Selection in a Data Warehouse -- Information Retrieval -- ExSight: Highly Accurate Object Based Image Retrieval System Enhanced by Redundant Object Extraction -- Applying Anaphora Resolution to Question Answering and Information Retrieval Systems -- MB+tree: A Dynamically Updatable Metric Index for Similarity Search -- An Information Store and Retrieval Facility on CORBA -- Retrieving Content Directly from Antique Book Images -- Semi-Structured Data -- Schema Based Data Storage and Query Optimization for Semi-structured Data1 -- Automatic Wrapper Generation for Web Search Engines -- Multi-level Schema Extraction for Heterogeneous Semi-structured Data -- Agent, Rough Set and Learning -- Rough Set Based WebCT Learning -- MultiAgent Systems for Coalition Support -- A Fast Globally Supervised Learning Algorithm for Gaussian Mixture Models -- Optimizing Classifiers by Genetic Algorithm.
    Content: Database research and development has been remarkably successful over the past three decades. Now the field is facing new challenges posted by the rapid advances of technology, especially the penetration of the Web and Internet into everyone's daily life. The economical and financial environment where database systems are used has been changing dramatically. In addition to being able to efficiently manage a large volume of operational data generated internally, the ability to manage data in cyberspace, extract relevant information, and discover knowledge to support decision making is critical to the success of any organization. In order to provide researchers and practitioners with a forum to share their experiences in tackling problems in managing and using data, information, and knowledge in the age of the Internet and Web, the First International Conference on Web-Age Information Management (WAIM 2000) was held in Shanghai, China, June 21-23. The inaugural conference in its series was well received. Researchers from 17 countries and regions, including Austria, Australia, Bahrain, Canada, China, France, Germany, Japan, Korea, Malaysia, The Netherlands, Poland, Singapore, Spain, Taiwan, UK, and USA submitted their recent work. Twenty-seven regular and 14 short papers contained in these proceedings were presented during the two-day conference. These papers cover a large spectrum of issues, from classical data management such as object-oriented modeling, spatial and temporal databases to recent hits like data mining, data warehousing, semi-structured data, and XML.
    Note: Lizenzpflichtig
    Additional Edition: ISBN 9783540676270
    Additional Edition: Buchausg. u.d.T. Web-age information management Berlin : Springer, 2000 ISBN 3540676279
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: World Wide Web ; Information Retrieval ; World Wide Web ; Wissensextraktion ; Data Mining ; Data-Warehouse-Konzept ; Electronic Commerce ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berlin : Springer
    UID:
    gbv_744940117
    Format: Online-Ressource (XII, 471 p) , digital
    Edition: Second, Revised and Extended Edition
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783662040249
    Content: Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation."The best single book on cryptology today" (David Kahn, Cryptologia)"For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group)
    Note: Part I. Cryptography: Introductory Synopsis -- Aims and Methods of Cryptography -- Encryption Steps: Simple Substitution -- Encryption Steps: Polygraphic Substitution and Coding -- Encryption Steps: Linear Substitution -- Encryption Steps: Transposition -- Polyalphabetic Encryption: Families of Alphabets -- Polyalphabetic Encryption: Keys -- Composition of Classes of Methods -- Open Encryption Key Systems -- Encryption Security -- Part II. Cryptanalysis: Exhausting Combinatorial Complexity -- Anatomy of Language: Patterns -- Polyalphabetic Case: Probable Words -- Anatomy of Language: Frequencies -- Kappa and Chi -- Periodicity Examination -- Alignment of Accompanying Alphabets -- Compromises -- Linear Basis Analysis -- Anagramming -- Concluding Remarks -- Appendix: Axiomatic Information Theory -- Bibliography -- Index -- Photo Credits.
    Additional Edition: ISBN 9783662040263
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662040263
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662040256
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540668718
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages